{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:25:52Z","timestamp":1778297152264,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_5","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"49-59","source":"Crossref","is-referenced-by-count":12,"title":["A Public Key Cryptosystem Based on Elliptic Curves over \u2124\/n\u2124 Equivalent to Factoring"],"prefix":"10.1007","author":[{"given":"Bernd","family":"Meyer","sequence":"first","affiliation":[]},{"given":"Volker","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"5_CR1","unstructured":"M. Joye, J.-J. Quisquater: Personal communication"},{"key":"5_CR2","unstructured":"M. Joye, J.-J. Quisquater: Note on the public-key cryptosystem of Meyer and M\u00fcller, Technical Report CG-1996\/2, Universit\u00e9 catholique de Louvain"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz: Elliptic curve cryptosystems, Mathematics of Computation, 48 (1987), 203\u2013209","journal-title":"Mathematics of Computation"},{"key":"5_CR4","series-title":"Lect Notes Comput Sci","first-page":"252","volume-title":"Advances in Cryptology: Proceedings of Crypto\u2019 91","author":"K. Koyama","year":"1991","unstructured":"K. Koyama, U. Maurer, T. Okamoto, S. Vanstone: New Public-Key Schemes Based on Elliptic Curves over the Ring \u2124n, Advances in Cryptology: Proceedings of Crypto\u2019 91, Lecture Notes in Computer Science, 576 (1991), Springer-Verlag, 252\u2013266"},{"key":"5_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/BFb0000449","volume-title":"Advances in Cryptology-ASIACRYPT\u2019 94","author":"K. Kurosawa","year":"1995","unstructured":"K. Kurosawa, K. Okada, S. Tsujii: Low exponent attack against elliptic curve RSA, Advances in Cryptology-ASIACRYPT\u2019 94, Lecture Notes in Computer Science, 917 (1995), Springer-Verlag, 376\u2013383"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"A. Menezes: Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers (1993)","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"5_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology: Proceedings of Crypto\u2019 85","author":"V. Miller","year":"1986","unstructured":"V. Miller: Uses of elliptic curves in cryptography, Advances in Cryptology: Proceedings of Crypto\u2019 85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417\u2013426"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"V. Shoup: A New Polynomial Factorization Algorithm and its Implementation, Preprint, (1995)","DOI":"10.1006\/jsco.1995.1055"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"J. H. Silverman: The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics, 106, Springer-Verlag, (1986)","DOI":"10.1007\/978-1-4757-1920-8"},{"issue":"6","key":"5_CR10","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"IT-26","author":"H. C. Williams","year":"1980","unstructured":"H. C. Williams: A modification of the RSA public-key encryption procedure, IEEE Transactions on Information Theory, IT-26, No. 6, (1980), 726\u2013729","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:33:02Z","timestamp":1556739182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}